Secure Your Spot
About The Event
Anomali is hosting a virtual cyber threat intelligence briefing with Digital Shadows and Cybersixgill. Learn from industry thought-leaders about maintaining visibility of tactical intelligence, data leakage, and hunting adversaries at the Central Threat Day.
Who Should Attend
This session is intended for both CXO and Senior Technical Staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.
We will be donating to the Cyversity on behalf of all attendees. Cybersity is a non-profit, dedicated to the academic and professional success of minority cybersecurity students and professionals. Come learn and help those in need in our community!
Managing the Intersection of Threat Intelligence and Organizational Goals
Detecting Exposed Data: Beyond RansomwareMJ Knudsen, Senior Sales Engineer Manager, Digital Shadows
With increased data dumps related to ransomware, security teams are increasingly concerned about sensitive data exposed on the dark web. Unfortunately, data is exposed in even more locations, even more often. Code repositories, websites, and misconfigured file stores are exposing billions of files. Luckily, there are approaches you can take to detect and remediate these issues. Join Digital Shadows to learn about best practices for detecting exposed data online, top sources of exposed data, types of exposed data, and free tools to get started.
Evolving Threat Hunting to Adversary Hunting Using Threat IntelligenceSumukh Tendulkar, Sr. Director, Product Marketing and Edan Cohen, Cyber Threat Intelligence Specialist, Cybersixgill
The threat hunting practice has helped security teams detect and reduce dwell time of stealth threats. But most hunting expeditions focus on threats - leaving the adversary free to launch another set of attacks with different tactics. We need to evolve threat hunting into a hunt for the adversary. The deep and dark web, and other closed sources, provide valuable insights into the motivations and activities of threat actors. Over the course of this session, we will understand the motivation behind the actions of these actors, their social networks, and how to anticipate their next steps.